Tech Tips

Choose the right remote access method. For full network access, deploy client-to-site VPN using WireGuard, OpenVPN, or your firewall built-in VPN. For application-specific access, consider zero-trust tools like Cloudflare Access or Azure AD Application Proxy. Never expose RDP or SMB directly to the internet. Always require VPN first and layer MFA on top.
Use split-tunnel VPN for better performance. Full-tunnel routes all user traffic through the office, slowing web browsing and SaaS apps. Split-tunnel sends only internal traffic like file shares and on-prem apps through VPN and lets other traffic go direct. This reduces office internet load and improves user experience. Only use full-tunnel if compliance requires it.
Enforce MFA on VPN login. Username and password alone are not enough when remote access is available 24/7 from anywhere. Use TOTP apps, push notifications, or hardware tokens. Many modern firewalls and VPN appliances integrate with Duo, Microsoft Authenticator, or Google Authenticator. MFA on VPN blocks credential stuffing attacks.
Segment the network so remote users land in a restricted zone. Do not let VPN clients access every VLAN and server. Create a remote access VLAN with firewall rules permitting only necessary resources: file servers, ERP, email. Block lateral movement to workstations and admin subnets. This limits blast radius if a remote laptop is compromised.
Configure DNS properly so remote clients use the office DNS server while connected. They need to resolve internal hostnames like fileserver.local. Push DNS settings via VPN client config, not manually. Test by connecting remotely and pinging internal hosts by name. If it fails, check DNS push settings.
Optimize for home internet performance. Recommend staff use wired Ethernet where possible and upgrade to business-class internet with symmetrical upload speeds. Video calls, VPN, and cloud uploads all need good upload bandwidth. For critical remote workers, consider providing a stipend for upgraded internet or 4G/5G backup.
Use endpoint security and monitoring on remote devices. Deploy EDR, enable disk encryption, and require automatic updates. Remote laptops are outside your physical control and need the same security posture as office machines. Consider endpoint compliance checks: devices that are not patched or encrypted cannot connect to VPN.
Document remote access procedures and train users. Provide a quick-start guide covering how to connect to VPN, where to find files, and who to call for help. Run a trial remote work day to catch configuration issues before a real emergency.
Monitor VPN usage and performance. Track connection logs, failed login attempts, and bandwidth consumption. Sudden spikes in VPN traffic or login attempts from foreign IPs are red flags. Set up alerts for failed MFA attempts and review VPN logs weekly.
If you need help setting up secure remote access, configuring split-tunnel VPN, or deploying zero-trust solutions, HelpTek can design and deploy remote work infrastructure for Albuquerque and Santa Fe businesses. We support WireGuard, Fortinet, SonicWall, and pfSense.